Analysis
-
max time kernel
106s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 13:08
Behavioral task
behavioral1
Sample
06fea31ab3e1a56bde1d516c8d44b680_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
06fea31ab3e1a56bde1d516c8d44b680_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
06fea31ab3e1a56bde1d516c8d44b680_NeikiAnalytics.exe
-
Size
187KB
-
MD5
06fea31ab3e1a56bde1d516c8d44b680
-
SHA1
7180a0b39e57378c3e578fe3fad1790ee854b90b
-
SHA256
ce6a90c6a4ef2c429212b316bd2a6cc05453d8abb2c124320df56482f7f939f5
-
SHA512
4eb6b502ba221d78e0f54ba114fe54fb55a8e37c0e9935c7fe0cb0bed76825826252dd93edf624bda921cd05e8a817769fa97493e8455d3de05b4f3bf5fe1ddf
-
SSDEEP
3072:ddEUfKj8BYbDiC1ZTK7sxtLUIGT9kXH0hga4PjBy2t:dUSiZTK40V2a4PdyW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemuyajo.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrrbxf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdvioo.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqempdmow.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtudmg.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgepxn.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemffyqe.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvdpdi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemkleng.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemzovxy.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemxhslb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemztfdp.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvgaoq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlormi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemnxtij.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemxuajq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemjgbee.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemofepq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfqfvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgqzat.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemotahz.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemcmhqk.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemugqcq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemavrzg.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhjijj.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvztng.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemdrctd.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemigwhj.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyqwud.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemcpzfq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemmsbca.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqempgodm.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemngera.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemyzuzb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemgtwtl.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemisyff.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemodlrp.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemlateb.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqwdqi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfyfvp.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemhbnlm.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemmfdzj.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrtgzq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqapfe.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation 06fea31ab3e1a56bde1d516c8d44b680_NeikiAnalytics.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemsmece.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemglsoe.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemwdmgd.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemalpzs.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemvrhms.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemrjbgw.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemeaknc.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqembcmok.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfjhdm.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemxrulo.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemqpumg.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemusmoi.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemldwqf.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemfxeni.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemxbemm.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemzulsq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemmwsnn.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemtunnq.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation Sysqemirxwy.exe -
Executes dropped EXE 64 IoCs
pid Process 4380 Sysqemmsbca.exe 3572 Sysqemhjdfp.exe 512 Sysqemofoca.exe 4612 Sysqemldwqf.exe 4000 Sysqemovmbd.exe 4444 Sysqemodlrp.exe 2292 Sysqemlateb.exe 1760 Sysqemrkked.exe 4568 Sysqemzovxy.exe 5060 Sysqemoauqv.exe 3528 Sysqemtjlqx.exe 3352 Sysqembcmok.exe 5020 Sysqemtczru.exe 3732 Sysqemyeqef.exe 4832 Sysqemwmbsm.exe 3192 Sysqemjauam.exe 5100 Sysqemgqzat.exe 4496 Sysqemqpndx.exe 5056 Sysqemoyxll.exe 4228 Sysqembwttf.exe 3100 Sysqemdvioo.exe 1660 Sysqemlormi.exe 4540 Sysqemteoso.exe 4040 Sysqemddbvs.exe 3200 Sysqemvztng.exe 4404 Sysqemiflvo.exe 2032 Sysqemvdpdi.exe 4084 Sysqemndsbh.exe 8 Sysqemyzuzb.exe 4460 Sysqemjghcf.exe 1104 Sysqemdfwxo.exe 2376 Sysqemvimvc.exe 5060 Sysqemqwdqi.exe 2156 Sysqemsvslr.exe 3832 Sysqemgtwtl.exe 2928 Sysqemgivmo.exe 3000 Sysqemdgdrb.exe 1924 Sysqemisyff.exe 544 Sysqemybkfg.exe 3632 Sysqemfjhdm.exe 1572 Sysqemawxsy.exe 5064 Sysqemfyfvp.exe 4388 Sysqemvgaoq.exe 4804 Sysqemvcqgy.exe 4164 Sysqemngera.exe 3248 Sysqemhbihh.exe 3056 Sysqemklicl.exe 4956 Sysqemygbfc.exe 3196 Sysqemvhmxs.exe 3616 Sysqemkasyn.exe 2004 Sysqemdxkij.exe 2060 Sysqempgodm.exe 4612 Sysqempdmow.exe 3164 Sysqemsqqwd.exe 3556 Sysqemsnppg.exe 3700 Sysqemvxqkk.exe 2536 Sysqemnxtij.exe 3108 Sysqemfxeni.exe 2552 Sysqemxhslb.exe 4728 Sysqemdrctd.exe 3228 Sysqemuyajo.exe 1016 Sysqemxbemm.exe 544 Sysqemmnkrq.exe 2996 Sysqemsotas.exe -
resource yara_rule behavioral2/memory/3368-0-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233bf-6.dat upx behavioral2/memory/4380-36-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00080000000233be-42.dat upx behavioral2/files/0x00070000000233c0-73.dat upx behavioral2/memory/3572-74-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00080000000233bc-108.dat upx behavioral2/memory/512-109-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3368-140-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c1-146.dat upx behavioral2/memory/4612-148-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4380-178-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c2-184.dat upx behavioral2/memory/4000-186-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3572-216-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c3-222.dat upx behavioral2/memory/4444-224-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/512-255-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c4-261.dat upx behavioral2/memory/2292-263-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4612-293-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c5-299.dat upx behavioral2/memory/1760-301-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4000-331-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c6-337.dat upx behavioral2/memory/4568-339-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4444-369-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c7-375.dat upx behavioral2/memory/5060-377-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/2292-383-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c8-414.dat upx behavioral2/memory/3528-416-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1760-422-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233c9-452.dat upx behavioral2/memory/4568-454-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3352-456-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233ca-490.dat upx behavioral2/memory/5020-491-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5060-522-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233cb-528.dat upx behavioral2/memory/3732-530-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3528-560-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233cc-566.dat upx behavioral2/memory/4832-567-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3352-599-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3192-606-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233cd-605.dat upx behavioral2/files/0x00070000000233ce-641.dat upx behavioral2/memory/5100-643-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5020-645-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/files/0x00070000000233cf-679.dat upx behavioral2/memory/4496-681-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3732-686-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5056-716-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4832-745-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4228-751-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3192-756-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5100-782-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/3100-788-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4496-817-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/1660-823-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/5056-849-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4540-858-0x0000000000400000-0x000000000049E000-memory.dmp upx behavioral2/memory/4228-887-0x0000000000400000-0x000000000049E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemngera.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemglsoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemchpyu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemodlrp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqpndx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsqqwd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfxeni.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuilon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjfwxd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgwkid.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemigwhj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhjdfp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemndsbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvgaoq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxrulo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrjrij.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemjgbee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemotahz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdankq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemddbvs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemybkfg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfyfvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemxhslb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemzclbn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemckbut.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemldxgc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemaghea.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemiflvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvhmxs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmmwff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemalpzs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemfqfvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvztng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvxqkk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrrbxf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemofepq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdspsl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 06fea31ab3e1a56bde1d516c8d44b680_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemteoso.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsnppg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemmfdzj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemhjijj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemrjbgw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemsvslr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqlhoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemgnztl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqhqlr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemuyajo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemkleng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtudmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemtjlqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdrctd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemovhtb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemusmoi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemnwytl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemwmbsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemvdpdi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempdmow.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemugqcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemdmblo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemqwdqi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqemisyff.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Sysqempgodm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3368 wrote to memory of 4380 3368 06fea31ab3e1a56bde1d516c8d44b680_NeikiAnalytics.exe 81 PID 3368 wrote to memory of 4380 3368 06fea31ab3e1a56bde1d516c8d44b680_NeikiAnalytics.exe 81 PID 3368 wrote to memory of 4380 3368 06fea31ab3e1a56bde1d516c8d44b680_NeikiAnalytics.exe 81 PID 4380 wrote to memory of 3572 4380 Sysqemmsbca.exe 82 PID 4380 wrote to memory of 3572 4380 Sysqemmsbca.exe 82 PID 4380 wrote to memory of 3572 4380 Sysqemmsbca.exe 82 PID 3572 wrote to memory of 512 3572 Sysqemhjdfp.exe 83 PID 3572 wrote to memory of 512 3572 Sysqemhjdfp.exe 83 PID 3572 wrote to memory of 512 3572 Sysqemhjdfp.exe 83 PID 512 wrote to memory of 4612 512 Sysqemofoca.exe 84 PID 512 wrote to memory of 4612 512 Sysqemofoca.exe 84 PID 512 wrote to memory of 4612 512 Sysqemofoca.exe 84 PID 4612 wrote to memory of 4000 4612 Sysqemldwqf.exe 85 PID 4612 wrote to memory of 4000 4612 Sysqemldwqf.exe 85 PID 4612 wrote to memory of 4000 4612 Sysqemldwqf.exe 85 PID 4000 wrote to memory of 4444 4000 Sysqemovmbd.exe 86 PID 4000 wrote to memory of 4444 4000 Sysqemovmbd.exe 86 PID 4000 wrote to memory of 4444 4000 Sysqemovmbd.exe 86 PID 4444 wrote to memory of 2292 4444 Sysqemodlrp.exe 87 PID 4444 wrote to memory of 2292 4444 Sysqemodlrp.exe 87 PID 4444 wrote to memory of 2292 4444 Sysqemodlrp.exe 87 PID 2292 wrote to memory of 1760 2292 Sysqemlateb.exe 88 PID 2292 wrote to memory of 1760 2292 Sysqemlateb.exe 88 PID 2292 wrote to memory of 1760 2292 Sysqemlateb.exe 88 PID 1760 wrote to memory of 4568 1760 Sysqemrkked.exe 89 PID 1760 wrote to memory of 4568 1760 Sysqemrkked.exe 89 PID 1760 wrote to memory of 4568 1760 Sysqemrkked.exe 89 PID 4568 wrote to memory of 5060 4568 Sysqemzovxy.exe 90 PID 4568 wrote to memory of 5060 4568 Sysqemzovxy.exe 90 PID 4568 wrote to memory of 5060 4568 Sysqemzovxy.exe 90 PID 5060 wrote to memory of 3528 5060 Sysqemoauqv.exe 91 PID 5060 wrote to memory of 3528 5060 Sysqemoauqv.exe 91 PID 5060 wrote to memory of 3528 5060 Sysqemoauqv.exe 91 PID 3528 wrote to memory of 3352 3528 Sysqemtjlqx.exe 92 PID 3528 wrote to memory of 3352 3528 Sysqemtjlqx.exe 92 PID 3528 wrote to memory of 3352 3528 Sysqemtjlqx.exe 92 PID 3352 wrote to memory of 5020 3352 Sysqembcmok.exe 93 PID 3352 wrote to memory of 5020 3352 Sysqembcmok.exe 93 PID 3352 wrote to memory of 5020 3352 Sysqembcmok.exe 93 PID 5020 wrote to memory of 3732 5020 Sysqemtczru.exe 94 PID 5020 wrote to memory of 3732 5020 Sysqemtczru.exe 94 PID 5020 wrote to memory of 3732 5020 Sysqemtczru.exe 94 PID 3732 wrote to memory of 4832 3732 Sysqemyeqef.exe 95 PID 3732 wrote to memory of 4832 3732 Sysqemyeqef.exe 95 PID 3732 wrote to memory of 4832 3732 Sysqemyeqef.exe 95 PID 4832 wrote to memory of 3192 4832 Sysqemwmbsm.exe 96 PID 4832 wrote to memory of 3192 4832 Sysqemwmbsm.exe 96 PID 4832 wrote to memory of 3192 4832 Sysqemwmbsm.exe 96 PID 3192 wrote to memory of 5100 3192 Sysqemjauam.exe 97 PID 3192 wrote to memory of 5100 3192 Sysqemjauam.exe 97 PID 3192 wrote to memory of 5100 3192 Sysqemjauam.exe 97 PID 5100 wrote to memory of 4496 5100 Sysqemgqzat.exe 98 PID 5100 wrote to memory of 4496 5100 Sysqemgqzat.exe 98 PID 5100 wrote to memory of 4496 5100 Sysqemgqzat.exe 98 PID 4496 wrote to memory of 5056 4496 Sysqemqpndx.exe 99 PID 4496 wrote to memory of 5056 4496 Sysqemqpndx.exe 99 PID 4496 wrote to memory of 5056 4496 Sysqemqpndx.exe 99 PID 5056 wrote to memory of 4228 5056 Sysqemoyxll.exe 100 PID 5056 wrote to memory of 4228 5056 Sysqemoyxll.exe 100 PID 5056 wrote to memory of 4228 5056 Sysqemoyxll.exe 100 PID 4228 wrote to memory of 3100 4228 Sysqembwttf.exe 101 PID 4228 wrote to memory of 3100 4228 Sysqembwttf.exe 101 PID 4228 wrote to memory of 3100 4228 Sysqembwttf.exe 101 PID 3100 wrote to memory of 1660 3100 Sysqemdvioo.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\06fea31ab3e1a56bde1d516c8d44b680_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\06fea31ab3e1a56bde1d516c8d44b680_NeikiAnalytics.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmsbca.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmsbca.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjdfp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjdfp.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofoca.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofoca.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\Sysqemldwqf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldwqf.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemovmbd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovmbd.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemodlrp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemodlrp.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlateb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlateb.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrkked.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrkked.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzovxy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzovxy.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoauqv.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoauqv.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtjlqx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtjlqx.exe"12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\Sysqembcmok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembcmok.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtczru.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtczru.exe"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyeqef.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyeqef.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwmbsm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwmbsm.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjauam.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjauam.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgqzat.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgqzat.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqpndx.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpndx.exe"19⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoyxll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoyxll.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\Sysqembwttf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembwttf.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdvioo.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlormi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlormi.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\Sysqemteoso.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemteoso.exe"24⤵
- Executes dropped EXE
- Modifies registry class
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Sysqemddbvs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemddbvs.exe"25⤵
- Executes dropped EXE
- Modifies registry class
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvztng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvztng.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\Sysqemiflvo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemiflvo.exe"27⤵
- Executes dropped EXE
- Modifies registry class
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvdpdi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvdpdi.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Sysqemndsbh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemndsbh.exe"29⤵
- Executes dropped EXE
- Modifies registry class
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\Sysqemyzuzb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemyzuzb.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjghcf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjghcf.exe"31⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdfwxo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdfwxo.exe"32⤵
- Executes dropped EXE
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvimvc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvimvc.exe"33⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqwdqi.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqwdqi.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsvslr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsvslr.exe"35⤵
- Executes dropped EXE
- Modifies registry class
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgtwtl.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgivmo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgivmo.exe"37⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdgdrb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdgdrb.exe"38⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Sysqemisyff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemisyff.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Sysqemybkfg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemybkfg.exe"40⤵
- Executes dropped EXE
- Modifies registry class
PID:544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfjhdm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfjhdm.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\Sysqemawxsy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemawxsy.exe"42⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfyfvp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfyfvp.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvgaoq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvgaoq.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvcqgy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvcqgy.exe"45⤵
- Executes dropped EXE
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\Sysqemngera.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemngera.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhbihh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbihh.exe"47⤵
- Executes dropped EXE
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\Sysqemklicl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemklicl.exe"48⤵
- Executes dropped EXE
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Sysqemygbfc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemygbfc.exe"49⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvhmxs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvhmxs.exe"50⤵
- Executes dropped EXE
- Modifies registry class
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkasyn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkasyn.exe"51⤵
- Executes dropped EXE
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdxkij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdxkij.exe"52⤵
- Executes dropped EXE
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Sysqempgodm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempgodm.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Sysqempdmow.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempdmow.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsqqwd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsqqwd.exe"55⤵
- Executes dropped EXE
- Modifies registry class
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsnppg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsnppg.exe"56⤵
- Executes dropped EXE
- Modifies registry class
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\Sysqemvxqkk.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemvxqkk.exe"57⤵
- Executes dropped EXE
- Modifies registry class
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\Sysqemnxtij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnxtij.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Sysqemfxeni.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemfxeni.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxhslb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxhslb.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Sysqemdrctd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdrctd.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuyajo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuyajo.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxbemm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxbemm.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmnkrq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmnkrq.exe"64⤵
- Executes dropped EXE
PID:544 -
C:\Users\Admin\AppData\Local\Temp\Sysqemsotas.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsotas.exe"65⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhtcfq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhtcfq.exe"66⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Sysqemztfdp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemztfdp.exe"67⤵
- Checks computer location settings
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkleng.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkleng.exe"68⤵
- Checks computer location settings
- Modifies registry class
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxuajq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxuajq.exe"69⤵
- Checks computer location settings
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhbnlm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbnlm.exe"70⤵
- Checks computer location settings
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\Sysqempcnzm.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempcnzm.exe"71⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\Sysqempjmpy.exe"C:\Users\Admin\AppData\Local\Temp\Sysqempjmpy.exe"72⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\Sysqemkpcfs.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkpcfs.exe"73⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzulsq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzulsq.exe"74⤵
- Checks computer location settings
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmwsnn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmwsnn.exe"75⤵
- Checks computer location settings
PID:988 -
C:\Users\Admin\AppData\Local\Temp\Sysqemxrulo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemxrulo.exe"76⤵
- Checks computer location settings
- Modifies registry class
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Sysqemzclbn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzclbn.exe"77⤵
- Modifies registry class
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\Sysqemkbydr.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemkbydr.exe"78⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuilon.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuilon.exe"79⤵
- Modifies registry class
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmfdzj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmfdzj.exe"80⤵
- Checks computer location settings
- Modifies registry class
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Sysqemcbmmh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemcbmmh.exe"81⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\Sysqemuymxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuymxd.exe"82⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeaknc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeaknc.exe"83⤵
- Checks computer location settings
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Sysqemmmwff.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemmmwff.exe"84⤵
- Modifies registry class
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Sysqemuukll.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemuukll.exe"85⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\Sysqemhadtl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhadtl.exe"86⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrhqwh.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrhqwh.exe"87⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Sysqemzlbok.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemzlbok.exe"88⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\Sysqemeywkp.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemeywkp.exe"89⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\Sysqemugqcq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemugqcq.exe"90⤵
- Checks computer location settings
- Modifies registry class
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Sysqemckbut.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemckbut.exe"91⤵
- Modifies registry class
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhbxdn.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhbxdn.exe"92⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\Sysqembhplb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqembhplb.exe"93⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Sysqemovhtb.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemovhtb.exe"94⤵
- Modifies registry class
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\Sysqemhjijj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemhjijj.exe"95⤵
- Checks computer location settings
- Modifies registry class
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrtgzq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrtgzq.exe"96⤵
- Checks computer location settings
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjfwxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjfwxd.exe"97⤵
- Modifies registry class
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwkoxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwkoxd.exe"98⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\Sysqemgjbiz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgjbiz.exe"99⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\Sysqemlwwve.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlwwve.exe"100⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\Sysqemrjrij.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrjrij.exe"101⤵
- Modifies registry class
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrjbgw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrjbgw.exe"102⤵
- Checks computer location settings
- Modifies registry class
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Sysqemjgbee.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemjgbee.exe"103⤵
- Checks computer location settings
- Modifies registry class
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\Sysqemrrbxf.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemrrbxf.exe"104⤵
- Checks computer location settings
- Modifies registry class
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\Sysqemtudmg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtudmg.exe"105⤵
- Checks computer location settings
- Modifies registry class
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgwkid.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgwkid.exe"106⤵
- Modifies registry class
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Sysqemoehnj.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemoehnj.exe"107⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\Sysqemtunnq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemtunnq.exe"108⤵
- Checks computer location settings
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\Sysqemglsoe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemglsoe.exe"109⤵
- Checks computer location settings
- Modifies registry class
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqpumg.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqpumg.exe"110⤵
- Checks computer location settings
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqlhoo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqlhoo.exe"111⤵
- Modifies registry class
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\Sysqemofepq.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemofepq.exe"112⤵
- Checks computer location settings
- Modifies registry class
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Sysqemqapfe.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemqapfe.exe"113⤵
- Checks computer location settings
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Sysqemenaaw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemenaaw.exe"114⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\Sysqemldxgc.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemldxgc.exe"115⤵
- Modifies registry class
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\Sysqemgnztl.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemgnztl.exe"116⤵
- Modifies registry class
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\Sysqemwdmgd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemwdmgd.exe"117⤵
- Checks computer location settings
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\Sysqemlhqmw.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemlhqmw.exe"118⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\Sysqemnzjpz.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemnzjpz.exe"119⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Sysqemsmece.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemsmece.exe"120⤵
- Checks computer location settings
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\Sysqemykkxd.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemykkxd.exe"121⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\Sysqemdmblo.exe"C:\Users\Admin\AppData\Local\Temp\Sysqemdmblo.exe"122⤵
- Modifies registry class
PID:3308
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-